Resources

Testimonial

A big step towards a safer municipality

Huddinge municipality is the second-largest municipality in the metropolitan region, with over...

Nov 15, 2020

Laws & regulations

The impact of Schrems II - is data transfer still safe?

The Schrems II ruling disqualifies the transfer and processing of personal data from EU countries...

Nov 4, 2020

Testimonial

Protecting education from cybersecurity attacks

The protection of personal data is one of the most important challenges facing schools and...

Sep 14, 2020

Security tricks & trends

Security risks working from home

Remote work has increased drastically and at the same time, there are clear indications that...

May 13, 2020

Company news

Holm Security top 3 security company in Europe

Selected out of thousands of companies, Holm Security was announced winner in the Red Herring top...

May 3, 2020

Testimonial

Why cyber security in the food industry matters

Cyber security in the food sector is becoming increasingly important. The lack of a clear security...

Apr 17, 2020

Security tricks & trends

6 tips for safer Zoom video conferences

As we strive for social distancing and our governments recommend quarantine measures, many of us...

Apr 16, 2020

Phishing Awareness

Knocked out by COVID-19 - can you take another hit?

COVID-19 will not only have an impact on our lives in the real world. It will also have a major...

Mar 23, 2020

Company news

Partnering up with Airtel - one of the world's largest operators

As a step in establishing in India, Holm Security enters into a partnership with Bharti Airtel,...

Mar 12, 2020

Security tricks & trends

Cyber security predictions 2020

A new year, new vulnerabilities. From appliance hacking to password spraying - our security...

Jan 17, 2020

Hacker attacks & exploits

Are you protected against malware attacks?

Imagine this, one day you discover that your website is being used to propagate malware. Google...

Oct 3, 2019

Hacker attacks & exploits

How a cyber weapon is made

What is the difference between an ordinary damaging code and an advanced cyber weapon, and exactly...

Aug 29, 2019
❮ Go back Show more ❯